Tag: security vulnerability

  • Slashdot: Dead Google Apps Domains Can Be Compromised By New Owners

    Source URL: https://it.slashdot.org/story/25/01/15/2031225/dead-google-apps-domains-can-be-compromised-by-new-owners?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Dead Google Apps Domains Can Be Compromised By New Owners Feedly Summary: AI Summary and Description: Yes Summary: The text highlights a critical security vulnerability regarding the improper management of Google Workspace accounts by defunct startups, leading to potential unauthorized access to sensitive information once the domains are resold.…

  • Microsoft Security Blog: Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/01/13/analyzing-cve-2024-44243-a-macos-system-integrity-protection-bypass-through-kernel-extensions/ Source: Microsoft Security Blog Title: Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions Feedly Summary: Microsoft discovered a macOS vulnerability allowing attackers to bypass System Integrity Protection (SIP) by loading third party kernel extensions, which could lead to serious consequences, such as allowing attackers to install rootkits, create persistent…

  • The Register: Cryptojacking, backdoors abound as attackers abuse Aviatrix Controller bug

    Source URL: https://www.theregister.com/2025/01/13/severe_aviatrix_controller_vulnerability/ Source: The Register Title: Cryptojacking, backdoors abound as attackers abuse Aviatrix Controller bug Feedly Summary: This is what happens when you publish PoCs immediately “Several cloud deployments" are already compromised following the disclosure of the maximum-severity vulnerability in Aviatrix Controller, researchers say.… AI Summary and Description: Yes Summary: The text discusses a…

  • The Register: Europe coughs up €400 to punter after breaking its own GDPR data protection rules

    Source URL: https://www.theregister.com/2025/01/13/data_broker_hacked/ Source: The Register Title: Europe coughs up €400 to punter after breaking its own GDPR data protection rules Feedly Summary: PLUS: Data broker leak reveals extent of info trading; Hot new ransomware gang might be all AI, no bark; and more Infosec in brief Gravy Analytics, a vendor of location intelligence info…

  • Hacker News: WorstFit: Unveiling Hidden Transformers in Windows ANSI

    Source URL: https://blog.orange.tw/posts/2025-01-worstfit-unveiling-hidden-transformers-in-windows-ansi/ Source: Hacker News Title: WorstFit: Unveiling Hidden Transformers in Windows ANSI Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a novel security vulnerability termed “WorstFit” that exploits Microsoft Windows’ character encoding and conversion mechanisms, particularly its Best-Fit behavior, leading to various forms of attacks including Remote Code Execution…

  • Wired: License Plate Readers Are Leaking Real-Time Video Feeds and Vehicle Data

    Source URL: https://www.wired.com/story/license-plate-reader-live-video-data-exposed/ Source: Wired Title: License Plate Readers Are Leaking Real-Time Video Feeds and Vehicle Data Feedly Summary: Misconfigured license plate recognition systems reveal the livestreams of individual cameras and the wealth of data they collect about every vehicle that passes them by. AI Summary and Description: Yes Summary: The text reports on a…

  • Embrace The Red: AI Domination: Remote Controlling ChatGPT ZombAI Instances

    Source URL: https://embracethered.com/blog/posts/2025/spaiware-and-chatgpt-command-and-control-via-prompt-injection-zombai/ Source: Embrace The Red Title: AI Domination: Remote Controlling ChatGPT ZombAI Instances Feedly Summary: At Black Hat Europe I did a fun presentation titled SpAIware and More: Advanced Prompt Injection Exploits. Without diving into the details of the entire talk, the key point I was making is that prompt injection can impact…

  • Slashdot: New York Times Recognizes Open-Source Maintainers With 2024 ‘Good Tech’ Award

    Source URL: https://news.slashdot.org/story/25/01/06/0420212/new-york-times-recognizes-open-source-maintainers-with-2024-good-tech-award?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: New York Times Recognizes Open-Source Maintainers With 2024 ‘Good Tech’ Award Feedly Summary: AI Summary and Description: Yes Summary: The text highlights significant contributions from various tech projects and individuals that positively impact humanity, with a focus on open-source software maintainers who uncover critical security vulnerabilities. Additionally, it underscores…

  • Hacker News: Déjà vu: Ghostly CVEs in my terminal title

    Source URL: https://dgl.cx/2024/12/ghostty-terminal-title Source: Hacker News Title: Déjà vu: Ghostly CVEs in my terminal title Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a critical security vulnerability in the Ghostty terminal emulator, reminiscent of issues previously documented in terminal emulators from 2003. It highlights how in-band signaling can expose users to…

  • Alerts: Fortinet Releases Security Updates for FortiManager

    Source URL: https://www.cisa.gov/news-events/alerts/2024/12/20/fortinet-releases-security-updates-fortimanager Source: Alerts Title: Fortinet Releases Security Updates for FortiManager Feedly Summary: Fortinet released a security update to address a vulnerability in FortiManager. A remote cyber threat actor could exploit this vulnerability to take control of an affected system. Users and administrators are encouraged to review the following Fortinet Security Bulletin and apply…